Tactical Control Center

Purpose

Tactical Control Center lets you identify and infest devices:

The identification method should be agreed with the operating center.

What you can do

With Tactical Control Center you can:

Password request

When Tactical Control Center opens, a password must be entered, the same as the notebook on which it's running.

 

What the function looks like

 

To learn more

For a description of Tactical Control Center data see "Tactical Control Center data".

To learn more about Tactical Control Center see "What you should know about Tactical Control Center".

Procedures
Enable synchronization with RCS

 

Acquiring a protected WiFi network password

 

Infecting targets using automatic identification

 

Setting filters on tapped traffic

 

Forcing unknown device authentication

 

Infecting targets using manual identification

 

Cleaning erroneously infected devices

 

Identify the target by analyzing web chronology

 

Emulating an Access Point known by the target

 

Turn off Tactical Network Injector

RCS8.2 | User's and Installation Guide | © COPYRIGHT 2012